US20050213554A1 - Method, apparatus and system of packet transmission - Google Patents

Method, apparatus and system of packet transmission Download PDF

Info

Publication number
US20050213554A1
US20050213554A1 US10/810,687 US81068704A US2005213554A1 US 20050213554 A1 US20050213554 A1 US 20050213554A1 US 81068704 A US81068704 A US 81068704A US 2005213554 A1 US2005213554 A1 US 2005213554A1
Authority
US
United States
Prior art keywords
data packet
protection mechanism
parameters
modulation type
protect
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
US10/810,687
Other versions
US7489650B2 (en
Inventor
Boris Ginzburg
Rony Ross
Vladimir Kondratiev
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Intel Corp
Original Assignee
Intel Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Intel Corp filed Critical Intel Corp
Priority to US10/810,687 priority Critical patent/US7489650B2/en
Assigned to INTEL CORPORATION reassignment INTEL CORPORATION ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: GINZBURG, BORIS, KONDRATIEV, VLADIMIR, ROSS, RONY
Publication of US20050213554A1 publication Critical patent/US20050213554A1/en
Application granted granted Critical
Publication of US7489650B2 publication Critical patent/US7489650B2/en
Expired - Fee Related legal-status Critical Current
Adjusted expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L5/00Arrangements affording multiple use of the transmission path
    • H04L5/14Two-way operation using the same type of signal, i.e. duplex
    • H04L5/1438Negotiation of transmission parameters prior to communication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L1/00Arrangements for detecting or preventing errors in the information received
    • H04L1/0001Systems modifying transmission characteristics according to link quality, e.g. power backoff
    • H04L1/0002Systems modifying transmission characteristics according to link quality, e.g. power backoff by adapting the transmission rate
    • H04L1/0003Systems modifying transmission characteristics according to link quality, e.g. power backoff by adapting the transmission rate by switching between different modulation schemes
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W84/00Network topologies
    • H04W84/02Hierarchically pre-organised networks, e.g. paging networks, cellular networks, WLAN [Wireless Local Area Network] or WLL [Wireless Local Loop]
    • H04W84/10Small scale networks; Flat hierarchical networks
    • H04W84/12WLAN [Wireless Local Area Networks]

Definitions

  • network stations may use a channel access mechanism and a control mechanism to protect transportation of packets over the network.
  • An example of an access mechanism may be a Carrier Sense Multiple Access with Collision Avoidance (CSMA/CA) and, more specifically, CSMA/CA with a binary exponential backoff method.
  • CSMA/CA Carrier Sense Multiple Access with Collision Avoidance
  • RTS/CTS Request To Send/Clear To Send
  • a Request To Send/Clear To Send (RTS/CTS) protection mechanism included in the CSMA/CA mechanism may be used to protect packet transportation.
  • OFDM Orthogonal Frequency Multiplexing
  • Other “802.11g stations” may use a CTS-to-self protection mechanism to protect the “OFDM data packet”.
  • the protection mechanism may include transmitting RTS and/or CTS packets at a transmission rate for Direct Sequence Spread Spectrum/Complementary Code Keying (DSSS/CCK), which may be lower than a transmission rate used for transmitting the OFDM data packet.
  • DSSS/CCK Direct Sequence Spread Spectrum/Complementary Code Keying
  • FIG. 1 is a schematic diagram of a wireless communication system in accordance with some exemplary embodiments of the present invention
  • FIG. 2 is a schematic illustration of a communication station in accordance with some exemplary embodiments of the invention.
  • FIG. 3 is a schematic illustration of a flow chart of a method of selecting a modulation type and/or a protection mechanism, in accordance with an exemplary embodiment of the invention.
  • the present invention may be used in a variety of applications. Although the present invention is not limited in this respect, the circuits and techniques disclosed herein may be used in many apparatuses such as units of a wireless communication system, for example, a Wireless Local Area Network (WLAN) communication system and/or in any other unit and/or device.
  • Units of a WLAN communication system intended to be included within the scope of the present invention include, by way of example only, modems, Mobile Units (MU), Access Points (AP), wireless transmitters/receivers, and the like.
  • Types of WLAN communication systems intended to be within the scope of the present invention include, although are not limited to, WLAN communication systems as described by “IEEE-Std 802.11, 1999 Edition (ISO/IEC 8802-11: 1999)” standard (“the 802.11 standard”), and more particularly in “IEEE-Std 802.11b-1999 Supplement to 802.11-1999, Wireless LAN MAC and PHY specifications: Higher speed Physical Layer (PHY) extension in the 2.4 GHz band” (“the 802.11b standard”), and “IEEE-Std 802.11g-2003 Supplement to 802.11-1999, Wireless LAN MAC and PHY specifications: Further Higher Data Rate Extension in the 2.4 GHz band, Draft 8.2” (“the 802.11g standard”), and the like.
  • IEEE-Std 802.11, 1999 Edition (ISO/IEC 8802-11: 1999)” standard (“the 802.11 standard”)
  • circuits and techniques disclosed herein may also be used in units of wireless communication systems, digital communication systems, satellite communication systems and the like.
  • Devices, systems and methods incorporating aspects of embodiments of the invention are also suitable for computer communication network applications, for example, intranet and Internet applications.
  • Embodiments of the invention may be implemented in conjunction with hardware and/or software adapted to interact with a computer communication network, for example, a LAN, wide area network (WAN), or a global communication network, for example, the Internet.
  • a computer communication network for example, a LAN, wide area network (WAN), or a global communication network, for example, the Internet.
  • FIG. 1 schematically illustrates a wireless communication system 100 in accordance with an embodiment of the present invention.
  • communication system 100 may include a WLAN system.
  • communication system 100 may be defined, by the 802.11 standard, as a Basic Service Set (BSS).
  • BSS Basic Service Set
  • the BSS may include at least one communication station, for example, an AP 110 , and stations 120 , 130 , and 140 at least one of which may be a MU.
  • stations 140 , 130 and 120 may transmit and/or receive one or more packets over wireless communication system 100 .
  • the packets may include data, control messages, network information, and the like.
  • wireless communication system 100 may include two or more APs and two or more mobile stations, in which case wireless communication system 100 may be referred to as an extended service set (ESS), as defined by the 802.11 standard, although the scope of the present invention is not limited in this respect.
  • ESS extended service set
  • AP 110 may include one or more antennas 111 for transmitting and/or receiving packets, e.g., to/from stations 120 , 130 and/or 140 .
  • Stations 120 , 130 and/or 140 may include one or more antennas 121 , 131 and/or 141 , respectively, for transmitting and/or receiving packets, e.g., to/from AP 110 .
  • antennas 111 , 121 , 131 , and/or 141 may include but are not limited to internal antenna, dipole antenna, omni-directional antenna, a monopole antenna, an end fed antenna, a circularly polarized antenna, a micro-strip antenna, a diversity antenna and the like.
  • system 100 may include a “mixed client system”, i.e., one or more stations of system 100 , e.g., station 140 , may include a “legacy” communication device, e.g., able to operate in accordance with the 802.11b standard, and one or more stations of system 100 , e.g., station 120 , may include a “multi-modulation” communication device, e.g., able to modulate a data packet using one of two or more modulation types, e.g., in accordance with the 802.11g standard.
  • a “mixed client system” i.e., one or more stations of system 100 , e.g., station 140
  • a “legacy” communication device e.g., able to operate in accordance with the 802.11b standard
  • stations of system 100 e.g., station 120
  • may include a “multi-modulation” communication device e.g., able to modulate a data packet using one
  • station 140 may be able to modulate and/or demodulate data packets using a Direct Sequence Spread Spectrum/Complementary Code Keying (DSSS/CCK) modulation
  • station 120 may be able to modulate and/or demodulate data packets using either DSSS/CCK modulation or an Orthogonal Frequency Division Multiplexing (OFDM) modulation.
  • DSSS/CCK Direct Sequence Spread Spectrum/Complementary Code Keying
  • OFDM Orthogonal Frequency Division Multiplexing
  • AP 110 may include suitable WLAN AP communication circuitry, for example, AP circuitry able to operate in accordance with the 802.11g standard and/or any other suitable standard.
  • AP 110 may be able to control communication between AP 110 and stations 120 , 130 and/or 140 by sending control commands of a packet protection mechanism, e.g., via beacons 125 , 135 , 145 , if desired.
  • AP 110 may implement a Carrier Sense, Multiple Access/Collision Avoidance (CSMA/CA) mechanism, which may include a Request-To-Send/Clear-To-Send (RTS/CTS) mechanism, which may be used to provide collision protection to the transmission of a data frame, if desired.
  • CSMA/CA Carrier Sense, Multiple Access/Collision Avoidance
  • RTS/CTS Request-To-Send/Clear-To-Send
  • AP 110 may be able to inform a multi-modulation station that one or more legacy stations are present in communication system 100 .
  • AP 110 may use beacon 125 to inform station 120 that legacy station 140 is present in communication system 100 , e.g., by sending a “Non ERP presented” bit, as is known in the art.
  • station 120 may be able to determine, based on predetermined criteria, whether or not to protect a data packet to be transmitted, e.g., for reception by AP 110 , and/or to select a suitable protection mechanism from two or more protection mechanisms, as described below.
  • system 100 may include a “hidden node”, for example, station 130 , which may be referred to herein as “hidden station”.
  • stations 120 , 140 and AP 110 may be referred to herein as “visible stations” because they may receive all transmissions from other stations.
  • a hidden station for example, station 130 may receive transmissions from one station, for example, AP 110 , and may not receive transmissions from other stations, e.g., stations 120 and 140 .
  • FIG. 2 schematically illustrates a station 200 in accordance with some exemplary embodiments of the invention.
  • station 200 may include a station able to modulate a data packet to be transmitted to another station, e.g., to AP 110 ( FIG. 1 ), using one of two or more modulation types, e.g., the DSSS/CCK and the OFDM modulation types.
  • station 200 may include a multi-modulation station, e.g., station 120 ( FIG. 1 ).
  • station 200 may include a processor 202 , which may be associated with a memory (not shown).
  • Processor 202 may process data packets of signals 224 received via at least one antenna 208 and/or data packets of signals 222 intended for transmission via antenna 208 .
  • station 200 may also include a Media Access Control (MAC) module 204 associated with processor 202 , and a Physical (PHY) layer 206 associated with MAC 204 and antenna 208 , as are described in detail below.
  • MAC Media Access Control
  • PHY Physical
  • MAC 204 may include a channel estimator 218 , a controller 220 , a collision estimator 214 and a hidden node detector 216 .
  • Hidden node detector 216 may include any suitable hardware and/or software for detecting a hidden node, e.g., station 130 ( FIG. 1 ), for example, based on one or more received packets of signal 224 , as is known in the art.
  • Hidden node detector 216 may detect the hidden node, for example, by monitoring frames and/or packets received from other stations.
  • hidden node detector 216 may detect a hidden node, e.g., station 130 , if a CTS packet from AP 110 ( FIG.
  • hidden node detector 216 may detect a hidden node, e.g., station 130 , if an acknowledgement (ACK) message, e.g., from AP 110 to station 130 , is received by station 200 , but a corresponding packet from station 130 is not received by station 200 , and the channel is sensed as clear before the ACK message is received.
  • ACK acknowledgement
  • collision estimator 214 may include any suitable hardware and/or software for estimating a probability, P, of a transmission collision, e.g., between a packet transmitted by station 200 and a packet transmitted by another station, as is known in the art.
  • P a probability of a transmission collision
  • Such probability estimation may take into account, for example, an estimated Number of Active Stations (NAS) in the communication network system, e.g. system 100 ( FIG. 1 ), suitable properties of the communication network system, suitable properties of one or more stations in the communication network system, suitable properties of one or more APs in the communication network system, analysis of transmitted and/or received data, parameters, properties, packets and/or frames in the communication network system, and/or any other suitable information.
  • NAS Access Network Access Management Entity
  • channel estimator 218 may include any suitable hardware and/or software for estimating one or more attributes of a channel, e.g., between station 200 and a station, e.g., AP 110 ( FIG. 1 ), which is intended to receive a data packet from station 200 , and determining a current transmission rate, r 1 , for DSSS/CCK and/or a current transmission rate, r 2 , for OFDM as are known in the art.
  • the 802.11b standard defines transmission rates of 1, 2, 5.5, and 11 Mega bit per second (Mbps) for DSSS/CCK
  • the 802.11g standard defines transmission rates of 6, 9, 12, 18, 24, 36, 48, and 54 Mbps for OFDM.
  • Estimator 218 may be able to determine, e.g., based at least on the estimated channel attributes and/or a transmission range between station 200 and AP 110 ( FIG. 1 ), which of the defined transmission rates for DSSS/CCK is the current, e.g., maximal available, transmission rate for DSSS/CCK, and/or which of the defined transmission rates for OFDM is the current, e.g., maximal available, transmission rate for OFDM.
  • Estimator 218 may be also able to select a current preferred transmission rate, e.g., including either the current transmission rate for DSSS/CCK or the current transmission rate for OFDM, as known in the art.
  • controller 220 may include an RTS/CTS protection mechanism 213 and/or a CTS-to-self protection mechanism 215 , as are known in the art, to protect a data packet to be transmitted via antenna 208 .
  • station 200 may operate in a “mixed client” communication system, e.g., system 100 , including at least one legacy station, e.g., station 140 ( FIG. 1 ).
  • controller 220 may be able to select, e.g., based on a predetermined criterion, between modulating the data packet using a first, e.g., the OFDM, modulation type and protecting the data packet using the RTS/CTS protection mechanism, modulating the data packet using the first modulation type and protecting the data packet using the CTS-to-self protection mechanism, and modulating the data packet using a second, e.g., the DSSS/CCK, modulation type, as described in detail below.
  • controller 220 may use RTS/CTS protection mechanism 213 for protecting the data packet when a hidden node, e.g., station 140 , is detected by detector 216 , as known in the art.
  • controller 220 may also be able to provide PHY layer 206 with a transmit command 212 including the data packet to be transmitted.
  • Transmit command 212 may also include one or more instruction frames including modulation instructions corresponding to a modulation type for modulating the data packet and/or protection instructions corresponding to a protection mechanism for protecting the data packet, as described below.
  • PHY layer 206 may include any suitable software and/or hardware, as is known in the art, to modulate and transmit the data packet and/or the one or more protection frames of transmit command 212 via antenna 208 and/or to provide MAC 204 with received packets 224 from antenna 208 .
  • FIG. 3 schematically illustrates a flow chart of a method of selecting a modulation type and/or a protection mechanism, in accordance with an exemplary embodiment of the invention.
  • the method may be implemented, e.g., by controller 220 when used in conjunction with a “mixed client” communication system, for selecting between modulating the data packet using the OFDM modulation type and protecting the data packet using the RTS/CTS protection mechanism, modulating the data packet using the OFDM modulation type and protecting the data packet using a CTS-to-self protection mechanism, and modulating the data packet using DSSS/CCK modulation.
  • controller 220 when used in conjunction with a “mixed client” communication system, for selecting between modulating the data packet using the OFDM modulation type and protecting the data packet using the RTS/CTS protection mechanism, modulating the data packet using the OFDM modulation type and protecting the data packet using a CTS-to-self protection mechanism, and modulating the data packet using DSSS/CCK modulation.
  • controller 220 when used in conjunction with a “mixed client” communication system, for selecting between modulating the data packet using the OFDM modulation type and protecting the data packet using the RTS/CTS protection mechanism,
  • the method may include collecting and/or receiving data, parameters and/or properties about the communication network.
  • the data collected may include, for example, transmission packets, transmission frames and/or transmission data received, e.g., by station 200 , and/or any other suitable data.
  • the data collected may be used, for example, by channel estimator 218 , e.g., to estimate the channel attributes, by hidden node detector 216 , e.g., to detect a “hidden node”, and/or by collision estimator 214 , e.g., to estimate the collision probability P.
  • the data collected may also include legacy instructions regarding the presence of one or more legacy stations in the communication system. These legacy instructions may be received, for example, from AP 110 ( FIG. 1 ).
  • the method may include determining whether the current preferred transmission rate includes a transmission rate for OFDM, e.g., as described above, and whether legacy protection is required, i.e., whether one or more legacy stations are present in the communication system, e.g., based on the legacy instructions received from AP 110 .
  • the data packet may be modulated using a modulation type corresponding to the current preferred transmission rate, e.g., as is known in the art. For example, if the current preferred transmission rate does not include a transmission rate for OFDM, then the data packet may be modulated using the DSSS/CCK modulation type. If the current preferred transmission rate includes a transmission rate for OFDM and no legacy protection is required, then the data packet may be modulated using the OPDM modulation type.
  • the data packet may also be protected using the RTS/CTS protection mechanism, for example, if one or more hidden nodes are detected, e.g., by detector 216 .
  • the method may include estimating an expected time period, T CTS , for successfully transmitting the data packet if modulated using the OFDM modulation and protected using the CTS-to-itself protection mechanism, an expected time period, T RTS , for successfully transmitting the data packet if modulated using the OFDM modulation and protected using the RTS/CTS protection mechanism, and an expected time period, T CCK , for successfully transmitting the data packet if modulated using the DSSS/CCK modulation.
  • a successful transmission of the data packet may refer to station 200 receiving an ACK message, from the station, e.g., AP 110 ( FIG.
  • station 200 for example, does not receive an ACK message it may wait for a back-off time period, T backoff , as is known in the art, and re-transmit the data packet, e.g., until an ACK message is received.
  • T backoff a back-off time period
  • the time periods T CTS , T RTS , and/or T CCK may be evaluated as a function of the collision probability P, the rate r 1 , the rate r 2 , a length, L, of the data packet, and a basic DSSS/CCK rate, r 0 , as is known in the art.
  • T CTS ⁇ ( P , L , r 0 , r 1 , r 2 ) ( T CTS ⁇ ( cck ) + T SIFS + T DATA ⁇ ( ofdm ) ) ⁇ 1 1 - P + ( T SIFS + T ACK ⁇ ( ofdm ) ) + T Backoff ( 1 )
  • T RTS ⁇ ( P , L , r 0 , r 1 , r 2 ) T RTS ⁇ ( cck ) ⁇ 1 1 - P + ( T CTS ⁇ ( CCK ) + T SIFS + T DATA ⁇ ( ofdm ) + T SIFS + T ACK ⁇ ( ofdm ) ) + T Backoff ( 2 )
  • Tcck ⁇ ( P , L , r 1 ) T DATA ⁇ ( cck )
  • L MACOoverhead may equal 368 bits
  • T plyOverhead may equal 192 ⁇ s, 96 ⁇ s, or 24 ⁇ s, corresponding to a DSSS/CCK modulation type having a long preamble, a DSSS/CCK modulation type having a short preamble and an OFDM modulation type, respectively.
  • the method may also include comparing the time periods, T CTS , T RTS , and/or T CCK , and selecting a protection mechanism and/or modulation type corresponding to the shortest one of the time periods T CTS , T RTS , and/or T CCK , e.g., as described below. It will be appreciated that it may not be necessary to determine T backoff in order to compare Equations 1, 2, and 3, since each of the Equations includes an addition of T backoff .
  • the method may include determining if T CCK ⁇ T RTS , as indicated at block 322 .
  • the method may further include determining if T CCK ⁇ T CTS , as indicated at block 326 . If T CCK ⁇ T CTS , then the method may further include selecting the DSSS/CCK modulation type, as indicated at block 328 .
  • the method may further include selecting the OFDM modulation and the CTS-to-self protection mechanism, as indicated at block 330 .
  • the method may further include determining if T RTS ⁇ T CTS , as indicated at block 324 .
  • the method may further include selecting the OFDM modulation type and the RTS/CTS protection mechanism, as indicated at block 332 .
  • the method may further include selecting the OFDM modulation and the CTS-to-self protection mechanism, as indicated at block 330 .
  • the data packet may be scheduled for transmission. This may include, for example, modulating the data packet using the selected modulation type, and/or protecting the data packet using the selected protection mechanism.
  • the modulation type and/or protection mechanism may be selected based on any other suitable criteria, for example, expected power consumption level, as described below.
  • the method may include evaluating an expected power consumption level, P CTS , for successfully transmitting the data packet if modulated using the OFDM modulation and protected using the CTS-to-itself protection mechanism, an expected power consumption level, P RTS , for successfully transmitting the data packet if modulated using the OFDM modulation and protected using the RTS/CTS protection mechanism, and an expected power consumption level, P CCK , for successfully transmitting the data packet if modulated using the DSSS/CCK modulation.
  • the power consumption levels P CTS , P RTS , and/or P CCK may be evaluated as a function of the collision probability P, the rate r 1 , the rate r 2 , the length, L, and the rate, r 0 .
  • P CTS ⁇ ( P , L , r 0 , r 1 , r 2 ) ( K Tx * T CTS ⁇ ( cck ) + K Rx * T SIFS + K Tx ⁇ T DATA ⁇ ( ofdm ) ) ⁇ 1 1 - P + K Rx * ( T SIFS + T ACK ⁇ ( ofdm ) ) + K Rx * T Backoff ( 5 )
  • P RTS ⁇ ( P , L , r 0 , r 1 , r 2 ) K Tx * T RTS ⁇ ( cck ) ⁇ 1 1 1 1 1 - P + K Rx * ( T SIFS + T ACK ⁇ ( ofdm )
  • the method according to these exemplary embodiments may also include comparing the power consumption levels, P CTS , P RTS , and/or P CCK , and selecting a protection mechanism and/or modulation type corresponding to the lowest power consumption level, e.g., in analogy to the above description of block 310 ( FIG. 3 ).
  • the method apparatus and/or system according to exemplary embodiments of the invention may provide an increased throughput, e.g., when implemented in conjunction with a “mixed client” communication system, in comparison to conventional methods apparatuses and/or systems, which may use the same protection mechanism to protect a data packet to be transmitted in the “mixed client” system.
  • Embodiments of the present invention may be implemented by software, by hardware, or by any combination of software and/or hardware as may be suitable for specific applications or in accordance with specific design requirements.
  • Embodiments of the present invention may include units and sub-units, which may be separate of each other or combined together, in whole or in part, and may be implemented using specific, multi-purpose or general processors, or devices as are known in the art.
  • Some embodiments of the present invention may include buffers, registers, storage units and/or memory units, for temporary or long-term storage of data and/or in order to facilitate the operation of a specific embodiment.

Abstract

Embodiments of the present invention provide a method, apparatus and system which may include selecting, based on a predetermined criterion, a modulation type and/or a protection mechanism to be used for transmission of a data packet, e.g., in wireless LAN communication system. Other embodiments are described and claimed.

Description

    BACKGROUND OF THE INVENTION
  • In wireless local area networks (WLAN), network stations may use a channel access mechanism and a control mechanism to protect transportation of packets over the network. An example of an access mechanism may be a Carrier Sense Multiple Access with Collision Avoidance (CSMA/CA) and, more specifically, CSMA/CA with a binary exponential backoff method. A Request To Send/Clear To Send (RTS/CTS) protection mechanism included in the CSMA/CA mechanism may be used to protect packet transportation.
  • Some “802.11g stations”, i.e., stations operating in accordance with the 802.11g standard, may use the RTS/CTS protection mechanism to protect an “OFDM data packet”, i.e., a data packet modulated using Orthogonal Frequency Multiplexing (OFDM) modulation, from collision with a transmission of a “legacy station”, e.g., a station operating in accordance with the 802.11b standard. Other “802.11g stations” may use a CTS-to-self protection mechanism to protect the “OFDM data packet”.
  • This may result in a reduced communication throughput, since the protection mechanism may include transmitting RTS and/or CTS packets at a transmission rate for Direct Sequence Spread Spectrum/Complementary Code Keying (DSSS/CCK), which may be lower than a transmission rate used for transmitting the OFDM data packet.
  • BRIEF DESCRIPTION OF THE DRAWINGS
  • The subject matter regarded as the invention is particularly pointed out and distinctly claimed in the concluding portion of the specification. The invention, however, both as to organization and method of operation, together with objects, features and advantages thereof, may best be understood by reference to the following detailed description when read with the accompanied drawings in which:
  • FIG. 1 is a schematic diagram of a wireless communication system in accordance with some exemplary embodiments of the present invention;
  • FIG. 2 is a schematic illustration of a communication station in accordance with some exemplary embodiments of the invention; and
  • FIG. 3 is a schematic illustration of a flow chart of a method of selecting a modulation type and/or a protection mechanism, in accordance with an exemplary embodiment of the invention.
  • It will be appreciated that for simplicity and clarity of illustration, elements shown in the drawings have not necessarily been drawn accurately or to scale. For example, the dimensions of some of the elements may be exaggerated relative to other elements for clarity or several physical components included in one functional block or element. Further, where considered appropriate, reference numerals may be repeated among the drawings to indicate corresponding or analogous elements. Moreover, some of the blocks depicted in the drawings may be combined into a single function.
  • DETAILED DESCRIPTION OF EMBODIMENTS OF THE INVENTION
  • In the following detailed description, numerous specific details are set forth in order to provide a thorough understanding of the invention. However, it will be understood by those of ordinary skill in the art that the present invention may be practiced without these specific details. In other instances, well-known methods, procedures, components and circuits may not have been described in detail so as not to obscure the present invention.
  • Unless specifically stated otherwise, as apparent from the following discussions, it is appreciated that throughout the specification discussions utilizing terms such as “processing,” “computing,” “calculating,” “determining,” or the like, refer to the action and/or processes of a computer or computing system, or similar electronic computing device, that manipulate and/or transform data represented as physical, such as electronic, quantities within the computing system's registers and/or memories into other data similarly represented as physical quantities within the computing system's memories, registers or other such information storage, transmission or display devices. In addition, the term “plurality” may be used throughout the specification to describe two or more components, devices, elements, parameters and the like.
  • It should be understood that the present invention may be used in a variety of applications. Although the present invention is not limited in this respect, the circuits and techniques disclosed herein may be used in many apparatuses such as units of a wireless communication system, for example, a Wireless Local Area Network (WLAN) communication system and/or in any other unit and/or device. Units of a WLAN communication system intended to be included within the scope of the present invention include, by way of example only, modems, Mobile Units (MU), Access Points (AP), wireless transmitters/receivers, and the like.
  • Types of WLAN communication systems intended to be within the scope of the present invention include, although are not limited to, WLAN communication systems as described by “IEEE-Std 802.11, 1999 Edition (ISO/IEC 8802-11: 1999)” standard (“the 802.11 standard”), and more particularly in “IEEE-Std 802.11b-1999 Supplement to 802.11-1999, Wireless LAN MAC and PHY specifications: Higher speed Physical Layer (PHY) extension in the 2.4 GHz band” (“the 802.11b standard”), and “IEEE-Std 802.11g-2003 Supplement to 802.11-1999, Wireless LAN MAC and PHY specifications: Further Higher Data Rate Extension in the 2.4 GHz band, Draft 8.2” (“the 802.11g standard”), and the like.
  • Although the scope of the present invention is not limited in this respect, the circuits and techniques disclosed herein may also be used in units of wireless communication systems, digital communication systems, satellite communication systems and the like.
  • Devices, systems and methods incorporating aspects of embodiments of the invention are also suitable for computer communication network applications, for example, intranet and Internet applications. Embodiments of the invention may be implemented in conjunction with hardware and/or software adapted to interact with a computer communication network, for example, a LAN, wide area network (WAN), or a global communication network, for example, the Internet.
  • Reference is made to FIG. 1, which schematically illustrates a wireless communication system 100 in accordance with an embodiment of the present invention.
  • In some exemplary embodiments of the invention, communication system 100 may include a WLAN system. Although the scope of the present invention is not limited in this respect, communication system 100 may be defined, by the 802.11 standard, as a Basic Service Set (BSS). For example, the BSS may include at least one communication station, for example, an AP 110, and stations 120, 130, and 140 at least one of which may be a MU. In some embodiments, stations 140, 130 and 120 may transmit and/or receive one or more packets over wireless communication system 100. The packets may include data, control messages, network information, and the like. Additionally or alternatively, in other embodiments of the present invention, wireless communication system 100 may include two or more APs and two or more mobile stations, in which case wireless communication system 100 may be referred to as an extended service set (ESS), as defined by the 802.11 standard, although the scope of the present invention is not limited in this respect.
  • According to exemplary embodiments of the invention, AP 110 may include one or more antennas 111 for transmitting and/or receiving packets, e.g., to/from stations 120, 130 and/or 140. Stations 120, 130 and/or 140 may include one or more antennas 121, 131 and/or 141, respectively, for transmitting and/or receiving packets, e.g., to/from AP 110. Although the scope of the present invention is not limited in this respect, types of antennae that may be used for antennas 111, 121, 131, and/or 141 may include but are not limited to internal antenna, dipole antenna, omni-directional antenna, a monopole antenna, an end fed antenna, a circularly polarized antenna, a micro-strip antenna, a diversity antenna and the like.
  • According to some exemplary embodiments of the invention, system 100 may include a “mixed client system”, i.e., one or more stations of system 100, e.g., station 140, may include a “legacy” communication device, e.g., able to operate in accordance with the 802.11b standard, and one or more stations of system 100, e.g., station 120, may include a “multi-modulation” communication device, e.g., able to modulate a data packet using one of two or more modulation types, e.g., in accordance with the 802.11g standard. For example, although the invention is not limited by this example, in some embodiments station 140 may be able to modulate and/or demodulate data packets using a Direct Sequence Spread Spectrum/Complementary Code Keying (DSSS/CCK) modulation, and station 120 may be able to modulate and/or demodulate data packets using either DSSS/CCK modulation or an Orthogonal Frequency Division Multiplexing (OFDM) modulation.
  • According to exemplary embodiments of the invention, AP 110 may include suitable WLAN AP communication circuitry, for example, AP circuitry able to operate in accordance with the 802.11g standard and/or any other suitable standard. For example, AP 110 may be able to control communication between AP 110 and stations 120, 130 and/or 140 by sending control commands of a packet protection mechanism, e.g., via beacons 125, 135, 145, if desired. For example, AP 110 may implement a Carrier Sense, Multiple Access/Collision Avoidance (CSMA/CA) mechanism, which may include a Request-To-Send/Clear-To-Send (RTS/CTS) mechanism, which may be used to provide collision protection to the transmission of a data frame, if desired.
  • AP 110 may be able to inform a multi-modulation station that one or more legacy stations are present in communication system 100. For example, AP 110 may use beacon 125 to inform station 120 that legacy station 140 is present in communication system 100, e.g., by sending a “Non ERP presented” bit, as is known in the art. In such a case, according to exemplary embodiments of the invention, station 120 may be able to determine, based on predetermined criteria, whether or not to protect a data packet to be transmitted, e.g., for reception by AP 110, and/or to select a suitable protection mechanism from two or more protection mechanisms, as described below.
  • According to some exemplary embodiments, system 100 may include a “hidden node”, for example, station 130, which may be referred to herein as “hidden station”. In contrast, stations 120, 140 and AP 110, for example, may be referred to herein as “visible stations” because they may receive all transmissions from other stations. However, a hidden station, for example, station 130 may receive transmissions from one station, for example, AP 110, and may not receive transmissions from other stations, e.g., stations 120 and 140.
  • Reference is made to FIG. 2, which schematically illustrates a station 200 in accordance with some exemplary embodiments of the invention.
  • According to exemplary embodiments of the invention, station 200 may include a station able to modulate a data packet to be transmitted to another station, e.g., to AP 110 (FIG. 1), using one of two or more modulation types, e.g., the DSSS/CCK and the OFDM modulation types. For example, station 200 may include a multi-modulation station, e.g., station 120 (FIG. 1).
  • According to exemplary embodiments of the invention, station 200 may include a processor 202, which may be associated with a memory (not shown). Processor 202 may process data packets of signals 224 received via at least one antenna 208 and/or data packets of signals 222 intended for transmission via antenna 208.
  • According to exemplary embodiments of the invention station 200 may also include a Media Access Control (MAC) module 204 associated with processor 202, and a Physical (PHY) layer 206 associated with MAC 204 and antenna 208, as are described in detail below.
  • According to exemplary embodiments of the invention, MAC 204 may include a channel estimator 218, a controller 220, a collision estimator 214 and a hidden node detector 216. Hidden node detector 216 may include any suitable hardware and/or software for detecting a hidden node, e.g., station 130 (FIG. 1), for example, based on one or more received packets of signal 224, as is known in the art. Hidden node detector 216 may detect the hidden node, for example, by monitoring frames and/or packets received from other stations. For example, hidden node detector 216 may detect a hidden node, e.g., station 130, if a CTS packet from AP 110 (FIG. 1) is received but the corresponding RTS packet, e.g., from station 130, is not received, and the channel is sensed as clear before the CTS packet is received. Additionally or alternatively, hidden node detector 216 may detect a hidden node, e.g., station 130, if an acknowledgement (ACK) message, e.g., from AP 110 to station 130, is received by station 200, but a corresponding packet from station 130 is not received by station 200, and the channel is sensed as clear before the ACK message is received.
  • According to exemplary embodiments of the invention, collision estimator 214 may include any suitable hardware and/or software for estimating a probability, P, of a transmission collision, e.g., between a packet transmitted by station 200 and a packet transmitted by another station, as is known in the art. Such probability estimation may take into account, for example, an estimated Number of Active Stations (NAS) in the communication network system, e.g. system 100 (FIG. 1), suitable properties of the communication network system, suitable properties of one or more stations in the communication network system, suitable properties of one or more APs in the communication network system, analysis of transmitted and/or received data, parameters, properties, packets and/or frames in the communication network system, and/or any other suitable information.
  • According to exemplary embodiments of the invention, channel estimator 218 may include any suitable hardware and/or software for estimating one or more attributes of a channel, e.g., between station 200 and a station, e.g., AP 110 (FIG. 1), which is intended to receive a data packet from station 200, and determining a current transmission rate, r1, for DSSS/CCK and/or a current transmission rate, r2, for OFDM as are known in the art. For example, the 802.11b standard defines transmission rates of 1, 2, 5.5, and 11 Mega bit per second (Mbps) for DSSS/CCK, and the 802.11g standard defines transmission rates of 6, 9, 12, 18, 24, 36, 48, and 54 Mbps for OFDM. Estimator 218 may be able to determine, e.g., based at least on the estimated channel attributes and/or a transmission range between station 200 and AP 110 (FIG. 1), which of the defined transmission rates for DSSS/CCK is the current, e.g., maximal available, transmission rate for DSSS/CCK, and/or which of the defined transmission rates for OFDM is the current, e.g., maximal available, transmission rate for OFDM. Estimator 218 may be also able to select a current preferred transmission rate, e.g., including either the current transmission rate for DSSS/CCK or the current transmission rate for OFDM, as known in the art.
  • According to exemplary embodiments of the invention, controller 220 may include an RTS/CTS protection mechanism 213 and/or a CTS-to-self protection mechanism 215, as are known in the art, to protect a data packet to be transmitted via antenna 208.
  • According to some exemplary embodiments of the invention, station 200 may operate in a “mixed client” communication system, e.g., system 100, including at least one legacy station, e.g., station 140 (FIG. 1). In these exemplary embodiments of the invention, controller 220 may be able to select, e.g., based on a predetermined criterion, between modulating the data packet using a first, e.g., the OFDM, modulation type and protecting the data packet using the RTS/CTS protection mechanism, modulating the data packet using the first modulation type and protecting the data packet using the CTS-to-self protection mechanism, and modulating the data packet using a second, e.g., the DSSS/CCK, modulation type, as described in detail below.
  • Alternatively, if for example, the communication system includes only multi-modulation stations, e.g., no legacy stations are present, then controller 220 may use RTS/CTS protection mechanism 213 for protecting the data packet when a hidden node, e.g., station 140, is detected by detector 216, as known in the art.
  • According to exemplary embodiments of the invention, controller 220 may also be able to provide PHY layer 206 with a transmit command 212 including the data packet to be transmitted. Transmit command 212 may also include one or more instruction frames including modulation instructions corresponding to a modulation type for modulating the data packet and/or protection instructions corresponding to a protection mechanism for protecting the data packet, as described below. PHY layer 206 may include any suitable software and/or hardware, as is known in the art, to modulate and transmit the data packet and/or the one or more protection frames of transmit command 212 via antenna 208 and/or to provide MAC 204 with received packets 224 from antenna 208.
  • Reference is also made to FIG. 3, which schematically illustrates a flow chart of a method of selecting a modulation type and/or a protection mechanism, in accordance with an exemplary embodiment of the invention.
  • According to exemplary embodiments of the invention, the method may be implemented, e.g., by controller 220 when used in conjunction with a “mixed client” communication system, for selecting between modulating the data packet using the OFDM modulation type and protecting the data packet using the RTS/CTS protection mechanism, modulating the data packet using the OFDM modulation type and protecting the data packet using a CTS-to-self protection mechanism, and modulating the data packet using DSSS/CCK modulation. However, it will be appreciated by those skilled in the art that other methods according to exemplary embodiments of the invention may be implemented to select to protect the data packet using one of a plurality of any suitable protection mechanisms, or not to protect the data packet.
  • As indicated at block 302, the method may include collecting and/or receiving data, parameters and/or properties about the communication network. The data collected may include, for example, transmission packets, transmission frames and/or transmission data received, e.g., by station 200, and/or any other suitable data. The data collected may be used, for example, by channel estimator 218, e.g., to estimate the channel attributes, by hidden node detector 216, e.g., to detect a “hidden node”, and/or by collision estimator 214, e.g., to estimate the collision probability P. The data collected may also include legacy instructions regarding the presence of one or more legacy stations in the communication system. These legacy instructions may be received, for example, from AP 110 (FIG. 1).
  • As indicated at block 306, the method may include determining whether the current preferred transmission rate includes a transmission rate for OFDM, e.g., as described above, and whether legacy protection is required, i.e., whether one or more legacy stations are present in the communication system, e.g., based on the legacy instructions received from AP 110.
  • As indicated at block 312, if a current preferred transmission rate does not include a transmission rate for OFDM and/or no legacy protection is required, then the data packet may be modulated using a modulation type corresponding to the current preferred transmission rate, e.g., as is known in the art. For example, if the current preferred transmission rate does not include a transmission rate for OFDM, then the data packet may be modulated using the DSSS/CCK modulation type. If the current preferred transmission rate includes a transmission rate for OFDM and no legacy protection is required, then the data packet may be modulated using the OPDM modulation type. The data packet may also be protected using the RTS/CTS protection mechanism, for example, if one or more hidden nodes are detected, e.g., by detector 216.
  • As indicated at block 308, if the current preferred transmission rate includes a transmission rate for OFDM and legacy protection is required, then the method may include estimating an expected time period, TCTS, for successfully transmitting the data packet if modulated using the OFDM modulation and protected using the CTS-to-itself protection mechanism, an expected time period, TRTS, for successfully transmitting the data packet if modulated using the OFDM modulation and protected using the RTS/CTS protection mechanism, and an expected time period, TCCK, for successfully transmitting the data packet if modulated using the DSSS/CCK modulation. In this context, a successful transmission of the data packet may refer to station 200 receiving an ACK message, from the station, e.g., AP 110 (FIG. 1), intended to receive the data packet. If station 200, for example, does not receive an ACK message it may wait for a back-off time period, Tbackoff, as is known in the art, and re-transmit the data packet, e.g., until an ACK message is received.
  • According to exemplary embodiments of the invention, the time periods TCTS, TRTS, and/or TCCK may be evaluated as a function of the collision probability P, the rate r1, the rate r2, a length, L, of the data packet, and a basic DSSS/CCK rate, r0, as is known in the art. For example, the following equations may be used for evaluating TCTS, TRTS, and/or TCCK: T CTS ( P , L , r 0 , r 1 , r 2 ) = ( T CTS ( cck ) + T SIFS + T DATA ( ofdm ) ) 1 1 - P + ( T SIFS + T ACK ( ofdm ) ) + T Backoff ( 1 ) T RTS ( P , L , r 0 , r 1 , r 2 ) = T RTS ( cck ) 1 1 - P + ( T CTS ( CCK ) + T SIFS + T DATA ( ofdm ) + T SIFS + T ACK ( ofdm ) ) + T Backoff ( 2 ) Tcck ( P , L , r 1 ) = T DATA ( cck ) 1 1 - P + ( T SIFS + T ACK ( cck ) ) + T Backoff ( 3 )
    wherein:
    • TCTS(CCK) denotes the time period for transmitting a CTS frame using the DSSS/CCK modulation;
    • TRTS(CCK) denotes the time period for transmitting a RTS frame using the DSSS/CCK modulation;
    • TDATA(OFDM) denotes the time period for transmitting the data packet using the OFDM modulation;
    • TDATA(CCK) denotes the time period for transmitting the data packet using the DSSS/CCK modulation;
    • TACK(OFDM) denotes the time period for transmitting the ACK frame using the OFDM modulation;
    • and TSIFS denotes the Short Inter Frame Space (SIFS) time period, for example, 10 μs, as defined by the 802.11b standard and the 802.11g standard known in the art, or any other prescribed time period.
  • For example, a transmission time period, denoted TTx, e.g., corresponding to TCTS(CCK), TRTS(CCK), TDATA(OFDM), TDATA(CCK), or TACK(CCK), may be calculated using the following equation:
    T TX =T phyOverhead+(L MACOverhead +L payload)/r  (4)
    wherein:
    • TTX denotes the transmission time period, e.g., TCTS(CCK), TRTS(CCK), TDATA(OFDM), TDATA(CCK), or TACK(CCK), to be calculated;
    • TphyOverhead denotes a PHY layer Overhead time period corresponding to TTX, as is known in the art;
    • LMACOverhead denotes a MAC overhead bit-length, as is known in the art;
    • Lpayload denotes the length of the transmitted payload, e.g., the data, CTS, RTS, or ACK packet;
    • and r denotes the rate of TTX.
  • For example, although the invention is not limited by this example, in some embodiments LMACOoverhead may equal 368 bits, and TplyOverhead may equal 192 μs, 96 μs, or 24 μs, corresponding to a DSSS/CCK modulation type having a long preamble, a DSSS/CCK modulation type having a short preamble and an OFDM modulation type, respectively.
  • As indicated at block 310, according of exemplary embodiments of the invention, the method may also include comparing the time periods, TCTS, TRTS, and/or TCCK, and selecting a protection mechanism and/or modulation type corresponding to the shortest one of the time periods TCTS, TRTS, and/or TCCK, e.g., as described below. It will be appreciated that it may not be necessary to determine Tbackoff in order to compare Equations 1, 2, and 3, since each of the Equations includes an addition of Tbackoff.
  • According to exemplary embodiments of the invention, the method may include determining if TCCK<TRTS, as indicated at block 322.
  • If, TCCK<TRTS, then the method may further include determining if TCCK<TCTS, as indicated at block 326. If TCCK<TCTS, then the method may further include selecting the DSSS/CCK modulation type, as indicated at block 328.
  • If TCCK?TCTS, then the method may further include selecting the OFDM modulation and the CTS-to-self protection mechanism, as indicated at block 330.
  • If TCCK?TRTS, then the method may further include determining if TRTS<TCTS, as indicated at block 324.
  • If TRTS<TCTS, then the method may further include selecting the OFDM modulation type and the RTS/CTS protection mechanism, as indicated at block 332.
  • If TRTS?TCTS, then the method may further include selecting the OFDM modulation and the CTS-to-self protection mechanism, as indicated at block 330.
  • As indicated at block 314, the data packet may be scheduled for transmission. This may include, for example, modulating the data packet using the selected modulation type, and/or protecting the data packet using the selected protection mechanism.
  • Although the above description refers to exemplary embodiments of the invention, wherein the criterion for selecting the protection mechanism and/or the modulation type corresponds to an expected transmission time period, it will be appreciated by those skilled in the art that according to other embodiments of the invention, the modulation type and/or protection mechanism may be selected based on any other suitable criteria, for example, expected power consumption level, as described below.
  • According to some exemplary embodiments of the invention, the method may include evaluating an expected power consumption level, PCTS, for successfully transmitting the data packet if modulated using the OFDM modulation and protected using the CTS-to-itself protection mechanism, an expected power consumption level, PRTS, for successfully transmitting the data packet if modulated using the OFDM modulation and protected using the RTS/CTS protection mechanism, and an expected power consumption level, PCCK, for successfully transmitting the data packet if modulated using the DSSS/CCK modulation. The power consumption levels PCTS, PRTS, and/or PCCK may be evaluated as a function of the collision probability P, the rate r1, the rate r2, the length, L, and the rate, r0. For example, the following equations may be used for estimating PCTS, PRTS, and/or PCCK: P CTS ( P , L , r 0 , r 1 , r 2 ) = ( K Tx * T CTS ( cck ) + K Rx * T SIFS + K Tx T DATA ( ofdm ) ) 1 1 - P + K Rx * ( T SIFS + T ACK ( ofdm ) ) + K Rx * T Backoff ( 5 ) P RTS ( P , L , r 0 , r 1 , r 2 ) = K Tx * T RTS ( cck ) 1 1 - P + K Rx * ( T CTS ( CCK ) + T SIFS ) + K Tx * T DATA ( ofdm ) + K Rx * ( T SIFS + T ACK ( ofdm ) ) + K Rx * T Backoff ( 6 ) Pcck ( P , L , r 1 ) = K TX * T DATA ( cck ) 1 1 - P + K Rx ( T SIFS + T ACK ( cck ) ) + K Rx * T Backoff ( 7 )
    wherein KTx denotes a power consumption level of the station, e.g., station 200, when transmitting a packet, e.g., a data packet or a RTS packet, and KRx denotes a power consumption level of the station, e.g., station 200, when receiving a packet, e.g., an ACK, or CTS packet. For example, although the invention is not limited by this example, in some embodiments KTx may equal 1.3 Watts, and/or KRx may equal 0.8 Watts.
  • The method according to these exemplary embodiments may also include comparing the power consumption levels, PCTS, PRTS, and/or PCCK, and selecting a protection mechanism and/or modulation type corresponding to the lowest power consumption level, e.g., in analogy to the above description of block 310 (FIG. 3).
  • It will be appreciated by those skilled in the art that the method apparatus and/or system according to exemplary embodiments of the invention may provide an increased throughput, e.g., when implemented in conjunction with a “mixed client” communication system, in comparison to conventional methods apparatuses and/or systems, which may use the same protection mechanism to protect a data packet to be transmitted in the “mixed client” system.
  • Embodiments of the present invention may be implemented by software, by hardware, or by any combination of software and/or hardware as may be suitable for specific applications or in accordance with specific design requirements. Embodiments of the present invention may include units and sub-units, which may be separate of each other or combined together, in whole or in part, and may be implemented using specific, multi-purpose or general processors, or devices as are known in the art. Some embodiments of the present invention may include buffers, registers, storage units and/or memory units, for temporary or long-term storage of data and/or in order to facilitate the operation of a specific embodiment.
  • While certain features of the invention have been illustrated and described herein, many modifications, substitutions, changes, and equivalents may occur to those of ordinary skill in the art. It is, therefore, to be understood that the appended claims are intended to cover all such modifications and changes as fall within the true spirit of the invention.

Claims (35)

1. A method comprising:
selecting, based on a predetermined criterion related to a successful transmission of a data packet, one of at least first and second protection mechanisms to protect said data packet.
2. The method of claim 1, wherein selecting comprises selecting to modulate said data packet using a first modulation type and to protect said data packet using said first protection mechanism, to modulate said data packet using said first modulation type and to protect said data packet using said second protection mechanism, or to modulate said data packet using a second modulation type.
3. The method of claim 2, wherein said first modulation type comprises orthogonal frequency division multiplexing, and wherein said second modulation type comprises direct sequence spread spectrum/complementary code keying.
4. The method of claim 1, wherein said first protection mechanism comprises a request-to-send/clear-to-send protection mechanism, and wherein said second protection mechanism comprises a clear-to-send-to-self protection mechanism.
5. The method of claim 1 comprising estimating at least one of a first parameter related to said data packet being protected using said first protection mechanism, a second parameter related to said data packet being protected using said second protection mechanism, and a third parameter related to said data packet not being protected, wherein said criterion relates to one or more of said parameters.
6. The method of claim 5, wherein at least one of said parameters is a time period for successful transmission of said data packet.
7. The method of claim 5, wherein at least one of said parameters is a power consumption for successful transmission of said data packet.
8. The method of claim 5, wherein estimating comprises estimating at least one of said parameters based on one or more of a length of said data packet, a collision probability, a rate of a first modulation type, and a rate of a second modulation type.
9. The method of claim 5, wherein selecting based on said predetermined criterion comprises comparing between at least two of said first, second and third parameters.
10. The method of claim 5 comprising:
selecting to protect said data packet using said first protection mechanism if said third parameter is greater than said second parameter and said first parameter is smaller than said second parameter; and
selecting to protect said data packet using said second protection mechanism if said first and third parameters are greater than said second parameter.
11. The method of claim 5 comprising selecting not to protect said data packet if said third parameter is smaller than said first and second parameters.
12. An apparatus comprising a controller able to select, based on a predetermined criterion related to a successful transmission of a data packet, one of at least first and second protection mechanisms to protect said data packet.
13. The apparatus of claim 12, wherein said controller is able to select to modulate said data packet using a first modulation type and to protect said data packet using said first protection mechanism, to modulate said data packet using said first modulation type and to protect said data packet using said second protection mechanism, or to modulate said data packet using a second modulation type.
14. The apparatus of claim 13, wherein said first modulation type comprises orthogonal frequency division multiplexing, and wherein said second modulation type comprises direct sequence spread spectrum/complementary code keying.
15. The apparatus of claim 12, wherein said first protection mechanism comprises a request-to-send/clear-to-send protection mechanism, and wherein said second protection mechanism comprises a clear-to-send-to-self protection mechanism.
16. The apparatus of claim 12, wherein said controller is able to estimate at least one of a first parameter related to said data packet being protected using said first protection mechanism, a second parameter related to said data packet being protected using said second protection mechanism, and a third parameter related to said data packet not being protected, wherein said criterion relates to one or more of said parameters.
17. The apparatus of claim 16, wherein said controller is able to estimate at least one of said parameters based on one or more of a length of said data packet, a collision probability, a rate of a first modulation type, and a rate of a second modulation type.
18. The apparatus of claim 16, wherein at least one of said parameters is a time period for successful transmission of said data packet.
19. The apparatus of claim 16, wherein at least one of said parameters is a power consumption for successful transmission of said data packet.
20. The apparatus of claim 16 wherein said controller is able to compare between at least two of said first, second and third parameters.
21. The apparatus of claim 16, wherein said controller is able to:
select to protect said data packet using said first protection mechanism if said third parameter is greater than said second parameter and said first parameter is smaller than said second parameter; and
select to protect said data packet using said second protection mechanism if said first and third parameters are greater than said second parameter.
22. A wireless device comprising:
a controller able to select, based on a predetermined criterion related to a successful transmission of a data packet, one of at least first and second protection mechanisms to protect said data packet; and
one or more omni-directional antennas able to transmit said data packet.
23. The wireless device of claim 22, wherein said controller is able to select to modulate said data packet using a first modulation type and to protect said data packet using said first protection mechanism, to modulate said data packet using said first modulation type and to protect said data packet using said second protection mechanism, or to modulate said data packet using a second modulation type.
24. The wireless device of claim 22, wherein said first protection mechanism comprises a request-to-send/clear-to-send protection mechanism, and wherein said second protection mechanism comprises a clear-to send-to-self protection mechanism.
25. The wireless device of claim 22, wherein said controller is able to estimate at least one of a first parameter related to said data packet being protected using said first protection mechanism, a second parameter related to said data packet being protected using said second protection mechanism, and a third parameter related to said data packet not being protected, wherein said criterion relates to one or more of said parameters.
26. The wireless device of claim 25, wherein said controller is able to compare between at least two of said first, second and third parameters.
27. The wireless device of claim 25, wherein at least one of said parameters is a time period for successful transmission of said data packet.
28. The wireless device of claim 25, wherein at least one of said parameters is a power consumption for successful transmission of said data packet.
29. A system comprising:
a first communication device comprising:
a controller able to select, based on a predetermined criterion related to a successful transmission of a data packet, one of at least first and second protection mechanisms to protect said data packet; and
one or more antennas able to transmit said data packet; and
a second communication device able to receive one or more data packets transmitted by said first device.
30. The system of claim 29, wherein said controller is able to estimate at least one of a first parameter related to said data packet being protected using said first protection mechanism, a second parameter related to said data packet being protected using said second protection mechanism, and a third parameter related to said data packet not being protected, wherein said criterion relates to one or more of said parameters.
31. The system of claim 30, wherein at least one of said parameters is a time period for successful transmission of said data packet.
32. A program storage device having instructions readable by a machine that when executed by the machine result in:
selecting, based on a predetermined criterion related to a successful transmission of a data packet, one of at least first and second protection mechanisms to protect said data packet.
33. The program storage device of claim 32, wherein the instructions resulting in selecting result in selecting to modulate said data packet using a first modulation type and to protect said data packet using said first protection mechanism, to modulate said data packet using said first modulation type and to protect said data packet using said second protection mechanism, or to modulate said data packet using a second modulation type.
34. The program storage device of claim 32, wherein said instructions result in estimating at least one of a first parameter related to said data packet being protected using said first protection mechanism, a second parameter related to said data packet being protected using said second protection mechanism, and a third parameter related to said data packet not being protected, wherein said criterion relates to one or more of said parameters.
35. The program storage device of claim 34, wherein the instructions resulting in selecting based on said predetermined criterion result in comparing between at least two of said first, second and third parameters.
US10/810,687 2004-03-29 2004-03-29 Method, apparatus and system of packet transmission Expired - Fee Related US7489650B2 (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
US10/810,687 US7489650B2 (en) 2004-03-29 2004-03-29 Method, apparatus and system of packet transmission

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
US10/810,687 US7489650B2 (en) 2004-03-29 2004-03-29 Method, apparatus and system of packet transmission

Publications (2)

Publication Number Publication Date
US20050213554A1 true US20050213554A1 (en) 2005-09-29
US7489650B2 US7489650B2 (en) 2009-02-10

Family

ID=34989721

Family Applications (1)

Application Number Title Priority Date Filing Date
US10/810,687 Expired - Fee Related US7489650B2 (en) 2004-03-29 2004-03-29 Method, apparatus and system of packet transmission

Country Status (1)

Country Link
US (1) US7489650B2 (en)

Cited By (19)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20050286562A1 (en) * 2004-06-28 2005-12-29 Seigo Nakao Method and apparatus for transmitting signals, and method and apparatus for receiving the signals
US20050286484A1 (en) * 2004-06-28 2005-12-29 Seigo Nakao Method and apparatus for transmitting signals
US20060215556A1 (en) * 2005-03-23 2006-09-28 Haitao Wu Systems and methods for coordinating wireless traffic for heterogeneous wireless devices
US20070201410A1 (en) * 2006-02-14 2007-08-30 Boris Ginzburg Techniques to enable direct link discovery in a wireless local area network
US20070298762A1 (en) * 2005-05-31 2007-12-27 Morris Robert P Methods, Systems, And Computer Program Products For Controlling Data Transmission Based On Power Cost
US20080155148A1 (en) * 2006-10-26 2008-06-26 Ozgur Oyman Cooperative communication of data
US20080192726A1 (en) * 2006-11-01 2008-08-14 Kumar Mahesh Wireless HD MAC frame format
KR100861928B1 (en) 2005-12-09 2008-10-09 삼성전자주식회사 Apparatus and method for controlling transmission rate according to collision in wireless lan
US20090124233A1 (en) * 2007-11-09 2009-05-14 Morris Robert P Methods, Systems, And Computer Program Products For Controlling Data Transmission Based On Power Cost
US20090213832A1 (en) * 2008-02-27 2009-08-27 Electronics And Telecommunications Research Institute Transmission reception apparatus of data using polarization transmission in los radio communication system
US20100157821A1 (en) * 2008-12-18 2010-06-24 Morris Robert P Methods, Systems, And Computer Program Products For Sending Data Units Based On A Measure Of Energy
US20100177719A1 (en) * 2009-01-09 2010-07-15 Samsung Electronics Co., Ltd. Method and system for contention-based medium access schemes for directional wireless transmission with asymmetric antenna system (aas) in wireless communication systems
US7826438B1 (en) * 2004-04-26 2010-11-02 Marvell International Ltd. Circuits, architectures, systems, methods, algorithms and software for reducing contention and/or handling channel access in a network
US20140328271A1 (en) * 2013-05-06 2014-11-06 Mediatek Inc. Methods for preventing in-device coexistence interference and communications apparatus utilizing the same
US20150312278A1 (en) * 2014-04-29 2015-10-29 Qualcomm Incorporated Remote station protection
CN105281864A (en) * 2014-05-30 2016-01-27 华为技术有限公司 Data transmission method and device
US9276636B2 (en) * 2014-06-04 2016-03-01 Texas Instruments Incorporated Adaptive modulation system and method to minimize energy consumption
US10154449B2 (en) * 2014-11-28 2018-12-11 Electronics And Telecommunications Research Institute Method and system for neighboring access point discovery between multi-band wireless LAN access points
US20220167175A1 (en) * 2020-11-26 2022-05-26 Arcadyan Technology Corporation Wireless communication system, group management method and channel selection method thereof

Families Citing this family (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
GB0622830D0 (en) * 2006-11-15 2006-12-27 Cambridge Silicon Radio Ltd Transmission rate selection
GB0622829D0 (en) * 2006-11-15 2006-12-27 Cambridge Silicon Radio Ltd Transmission rate selection
US8208392B2 (en) * 2007-08-13 2012-06-26 Samsung Electronics Co., Ltd. System and method for peer-to-peer beam discovery and communication in infrastructure based wireless networks using directional antennas
US8917675B2 (en) 2007-08-20 2014-12-23 Samsung Electronics Co., Ltd. System and method for multiple contention access periods
JP5125572B2 (en) * 2008-02-12 2013-01-23 日本電気株式会社 Wireless network traffic performance evaluation system, method and program
US8817676B2 (en) * 2008-11-03 2014-08-26 Samsung Electronics Co., Ltd. Method and system for station-to-station directional wireless communication
EP2302840A1 (en) * 2009-09-29 2011-03-30 Ceragon Networks LTD. Path protection by sharing continuity check messages
US8774095B2 (en) * 2011-10-25 2014-07-08 Hon Hai Precision Industry Co., Ltd. Wireless access point device and communication collision avoiding method
US9681458B2 (en) * 2013-11-11 2017-06-13 Mediatek Inc. Methods for packet transmission protection and communications apparatus utilizing the same

Citations (14)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6252854B1 (en) * 1996-06-17 2001-06-26 International Business Machines Corporation Rate selection in adaptive data rate systems
US20020061031A1 (en) * 2000-10-06 2002-05-23 Sugar Gary L. Systems and methods for interference mitigation among multiple WLAN protocols
US20030152086A1 (en) * 2002-02-11 2003-08-14 Tamer El Batt Apparatus, method, and computer program product for wireless networking using directional signaling
US20030169763A1 (en) * 2002-03-07 2003-09-11 Sunghyun Choi Coexistence of stations capable of different modulation schemes in a wireless local area network
US20040165564A1 (en) * 2003-02-26 2004-08-26 Samsung Electronics Co., Ltd. Physical layer unit for transmitting or receiving various signals, wireless LAN system including the same, and wireless LAN method using the wireless LAN system
US20040264600A1 (en) * 2003-06-30 2004-12-30 Ping-Chieh Kao Radio Receiver Supporting Multiple Modulation Formats with a Single Pair of ADCs
US20050032478A1 (en) * 2003-08-08 2005-02-10 Stephens Adrian P. Trained data transmission for communication systems
US20050044464A1 (en) * 2001-09-26 2005-02-24 Elena Costa Method and radio station for data transmission in a radio communication system
US20050053037A1 (en) * 2003-09-10 2005-03-10 Boris Ginzburg Method and device of adaptive control of data rate, fragmentation and request to send protection in wireless networks
US20050122989A1 (en) * 2003-12-09 2005-06-09 Boris Ginzburg Method and apparatus to estimate collision rate parameter
US20050128970A1 (en) * 2003-12-16 2005-06-16 Intel Corporation Systems and methods for adjusting transmit power in wireless local area networks
US20050141459A1 (en) * 2003-12-29 2005-06-30 Intel Corporation Apparatus and associated methods to reduce management overhead in a wireless communication system
US20050147071A1 (en) * 2004-01-05 2005-07-07 Jeyhan Karaoguz Multi-mode WLAN/PAN MAC
US6978151B2 (en) * 2001-05-10 2005-12-20 Koninklijke Philips Electronics N.V. Updating path loss estimation for power control and link adaptation in IEEE 802.11h WLAN

Patent Citations (14)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6252854B1 (en) * 1996-06-17 2001-06-26 International Business Machines Corporation Rate selection in adaptive data rate systems
US20020061031A1 (en) * 2000-10-06 2002-05-23 Sugar Gary L. Systems and methods for interference mitigation among multiple WLAN protocols
US6978151B2 (en) * 2001-05-10 2005-12-20 Koninklijke Philips Electronics N.V. Updating path loss estimation for power control and link adaptation in IEEE 802.11h WLAN
US20050044464A1 (en) * 2001-09-26 2005-02-24 Elena Costa Method and radio station for data transmission in a radio communication system
US20030152086A1 (en) * 2002-02-11 2003-08-14 Tamer El Batt Apparatus, method, and computer program product for wireless networking using directional signaling
US20030169763A1 (en) * 2002-03-07 2003-09-11 Sunghyun Choi Coexistence of stations capable of different modulation schemes in a wireless local area network
US20040165564A1 (en) * 2003-02-26 2004-08-26 Samsung Electronics Co., Ltd. Physical layer unit for transmitting or receiving various signals, wireless LAN system including the same, and wireless LAN method using the wireless LAN system
US20040264600A1 (en) * 2003-06-30 2004-12-30 Ping-Chieh Kao Radio Receiver Supporting Multiple Modulation Formats with a Single Pair of ADCs
US20050032478A1 (en) * 2003-08-08 2005-02-10 Stephens Adrian P. Trained data transmission for communication systems
US20050053037A1 (en) * 2003-09-10 2005-03-10 Boris Ginzburg Method and device of adaptive control of data rate, fragmentation and request to send protection in wireless networks
US20050122989A1 (en) * 2003-12-09 2005-06-09 Boris Ginzburg Method and apparatus to estimate collision rate parameter
US20050128970A1 (en) * 2003-12-16 2005-06-16 Intel Corporation Systems and methods for adjusting transmit power in wireless local area networks
US20050141459A1 (en) * 2003-12-29 2005-06-30 Intel Corporation Apparatus and associated methods to reduce management overhead in a wireless communication system
US20050147071A1 (en) * 2004-01-05 2005-07-07 Jeyhan Karaoguz Multi-mode WLAN/PAN MAC

Cited By (35)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7826438B1 (en) * 2004-04-26 2010-11-02 Marvell International Ltd. Circuits, architectures, systems, methods, algorithms and software for reducing contention and/or handling channel access in a network
US8050249B1 (en) * 2004-04-26 2011-11-01 Marvell International Ltd. Methods for reducing contention and/or handling channel access in a network
US20050286484A1 (en) * 2004-06-28 2005-12-29 Seigo Nakao Method and apparatus for transmitting signals
US20100246379A1 (en) * 2004-06-28 2010-09-30 Sanyo Electric Co., Ltd./NTT Data Sanyo System Corporation Method and apparatus for transmitting signals for multiple input multiple output wireless communication system
US8446812B2 (en) 2004-06-28 2013-05-21 Hera Wireless S.A. Method and apparatus for transmitting signals, and method and apparatus for receiving the signals
US8054739B2 (en) * 2004-06-28 2011-11-08 Sanyo Electric Co., Ltd. Method and apparatus for transmitting signals, and method and apparatus for receiving the signals
US20050286562A1 (en) * 2004-06-28 2005-12-29 Seigo Nakao Method and apparatus for transmitting signals, and method and apparatus for receiving the signals
US8265055B2 (en) 2004-06-28 2012-09-11 Hera Wireless S.A. Method and apparatus for transmitting signals for multiple input multiple output wireless communication system
US8254361B2 (en) 2004-06-28 2012-08-28 Hera Wireless S.A. Method and apparatus for transmitting signals for multiple input multiple output wireless communication system
US7626931B2 (en) * 2005-03-23 2009-12-01 Microsoft Corporation Systems and methods for coordinating wireless traffic for heterogeneous wireless devices
US20060215556A1 (en) * 2005-03-23 2006-09-28 Haitao Wu Systems and methods for coordinating wireless traffic for heterogeneous wireless devices
US8676154B2 (en) 2005-05-31 2014-03-18 Scenera Technologies, Llc Methods, systems, and computer program products for controlling data transmission based on power consumption
US8359002B2 (en) * 2005-05-31 2013-01-22 Scenera Technologies, Llc Methods, systems, and computer program products for controlling data transmission based on power cost
US20070298762A1 (en) * 2005-05-31 2007-12-27 Morris Robert P Methods, Systems, And Computer Program Products For Controlling Data Transmission Based On Power Cost
KR100861928B1 (en) 2005-12-09 2008-10-09 삼성전자주식회사 Apparatus and method for controlling transmission rate according to collision in wireless lan
US7522571B2 (en) 2006-02-14 2009-04-21 Intel Corporation Techniques to enable direct link discovery in a wireless local area network
US20070201410A1 (en) * 2006-02-14 2007-08-30 Boris Ginzburg Techniques to enable direct link discovery in a wireless local area network
US20080155148A1 (en) * 2006-10-26 2008-06-26 Ozgur Oyman Cooperative communication of data
US9065682B2 (en) * 2006-11-01 2015-06-23 Silicon Image, Inc. Wireless HD MAC frame format
US20080192726A1 (en) * 2006-11-01 2008-08-14 Kumar Mahesh Wireless HD MAC frame format
US20090124233A1 (en) * 2007-11-09 2009-05-14 Morris Robert P Methods, Systems, And Computer Program Products For Controlling Data Transmission Based On Power Cost
US8619671B2 (en) * 2008-02-27 2013-12-31 Electronics And Telecommuniations Research Institute Transmission reception apparatus of data using polarization transmission in los radio communication system
US20090213832A1 (en) * 2008-02-27 2009-08-27 Electronics And Telecommunications Research Institute Transmission reception apparatus of data using polarization transmission in los radio communication system
US20100157821A1 (en) * 2008-12-18 2010-06-24 Morris Robert P Methods, Systems, And Computer Program Products For Sending Data Units Based On A Measure Of Energy
US8385362B2 (en) * 2009-01-09 2013-02-26 Samsung Electronics Co., Ltd. Method and system for contention-based medium access schemes for directional wireless transmission with asymmetric antenna system (AAS) in wireless communication systems
US20130128839A1 (en) * 2009-01-09 2013-05-23 Samsung Electronics Co., Ltd. Method and system for contention-based medium access schemes for directional wireless transmission with asymmetric antenna system (aas) in wireless communication systems
US20100177719A1 (en) * 2009-01-09 2010-07-15 Samsung Electronics Co., Ltd. Method and system for contention-based medium access schemes for directional wireless transmission with asymmetric antenna system (aas) in wireless communication systems
US20140328271A1 (en) * 2013-05-06 2014-11-06 Mediatek Inc. Methods for preventing in-device coexistence interference and communications apparatus utilizing the same
US20150312278A1 (en) * 2014-04-29 2015-10-29 Qualcomm Incorporated Remote station protection
US20150312279A1 (en) * 2014-04-29 2015-10-29 Qualcomm Incorporated Remote station protection
CN105281864A (en) * 2014-05-30 2016-01-27 华为技术有限公司 Data transmission method and device
US9276636B2 (en) * 2014-06-04 2016-03-01 Texas Instruments Incorporated Adaptive modulation system and method to minimize energy consumption
US10154449B2 (en) * 2014-11-28 2018-12-11 Electronics And Telecommunications Research Institute Method and system for neighboring access point discovery between multi-band wireless LAN access points
US20220167175A1 (en) * 2020-11-26 2022-05-26 Arcadyan Technology Corporation Wireless communication system, group management method and channel selection method thereof
US11647394B2 (en) * 2020-11-26 2023-05-09 Arcadyan Technology Corporation Wireless communication system, group management method and channel selection method thereof

Also Published As

Publication number Publication date
US7489650B2 (en) 2009-02-10

Similar Documents

Publication Publication Date Title
US7489650B2 (en) Method, apparatus and system of packet transmission
US20050041616A1 (en) Method and apparatus to adapt threshold of data frame protect mechanism
EP1969771B1 (en) Method and apparatus for transmitting control frame to hidden node in wireless lan
US7372867B2 (en) Method and apparatus to provide channel access parameter
CN107197484B (en) Method and apparatus for reliable direct link access
US8139506B2 (en) Wireless communication apparatus for data communication through two or more channels
US20060176908A1 (en) Method and apparatus for determining ACK frame to acknowledge receipt of transmission frame on a WLAN
US7486650B2 (en) Method, apparatus and system of wireless transmission
EP1949640B1 (en) Medium access apparatus and method for preventing a plurality of stations in a wireless local area network from colliding with one another
US20160174260A1 (en) Method and system for carrier sense multiple access with collision avoidance (csma/ca) with directional transmission
US7502383B2 (en) Apparatus and method of controlling transmission of response frame
US20130128839A1 (en) Method and system for contention-based medium access schemes for directional wireless transmission with asymmetric antenna system (aas) in wireless communication systems
US20050147125A1 (en) Apparatus and method for controlling transmission power in a wireless communication system
US20040228311A1 (en) Communication system, communication apparatus, communication method, and program
EP3376692A1 (en) Terminal device and communication method
US20050213601A1 (en) Method and apparatus to provide hidden node protection
KR20130018660A (en) Wireless communication device, wireless communication system, wireless communication method and program
US9717022B2 (en) Method for dynamically adjusting channel bandwidth in wireless communications systems
JP2006261984A (en) Communication method
EP1642420B1 (en) Method and apparatus to provide channel access parameter
EP1847070A1 (en) Method and apparatus for determining ack frame to acknowledge receipt of transmission frame on a wlan
US11558746B2 (en) Protected WiFi sensing measurements

Legal Events

Date Code Title Description
AS Assignment

Owner name: INTEL CORPORATION, CALIFORNIA

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:GINZBURG, BORIS;ROSS, RONY;KONDRATIEV, VLADIMIR;REEL/FRAME:015158/0617

Effective date: 20040321

CC Certificate of correction
REMI Maintenance fee reminder mailed
FPAY Fee payment

Year of fee payment: 4

SULP Surcharge for late payment
REMI Maintenance fee reminder mailed
LAPS Lapse for failure to pay maintenance fees
STCH Information on status: patent discontinuation

Free format text: PATENT EXPIRED DUE TO NONPAYMENT OF MAINTENANCE FEES UNDER 37 CFR 1.362

FP Lapsed due to failure to pay maintenance fee

Effective date: 20170210